In a Denial of service attack, a hacker tries to flood the targeted machine with requests until all the resources are used up and the service becomes unavailable. A single computer is used to launch the attack.
The attacks can be generally divided into two types:
Buffer overflow attacks. In this attack, the hacker tries to manipulate the system in such a way that memory buffer overflow occurs. The machine then consumes all the available CPU resources, which will result in a system crash.
Flood attacks. The hacker tries to overwhelm the targeted computer by sending data packets to the machine. All the system resources are used up and, therefore, when an actual request comes to connect to the service, the machine is unavailable and the services can’t be accessed. These include sending ICMP packets, SYN packets, or other data packets.
Over the years, there have been considerable DoS attacks:
Use anti-DDoS Softwares to help distinguish between legitimate traffic and bogus traffic.
Dispersing traffic amongst servers can help make the attack ineffective. Higher capacity would require the hacker to have greater resources; therefore, the chances of a DoS attack are reduced.
Configuring firewalls and routers can filter out unwanted traffic.
In case of excessive traffic, make use of black hole routing, which redirects traffic to a null route to prevent the targeted machine from being overwhelmed and the services crashing.
DoS attacks require huge resources. Therefore, the hackers make use of DDoS attacks, which enables them to carry out attacks with someone else’s resources.
Free Resources